Watermarking Scheme for Numerical and Non-Numerical Relational Database
|
|
- Megan Cain
- 5 years ago
- Views:
Transcription
1 Watermarking Scheme for Numerical and Non-Numerical Relational Database Priyanka R. Gadiya 1, Prof. P.A.Kale 2 priyankagadiya89@gmail.com 1, prashantkale15@gmail.com 2 M. E. Student, Dept. of Computer Engg. Late G.N.Sapkal COE, Nashik, Maharashtra, India 1 Assistant Professor, Dept. of Computer Engg. Late G.N.Sapkal COE, Nashik, Maharashtra, India 2 Abstract Digitization and easy access to the internet leads to the excessive generation of data. The relational data is to be shared over internet, cloud for the purpose of research, business and decision making. The watermarking is technique which provides the protection to the database by embedding information. But during embedding data causes alternation which affect quality of data. Data recovery with the intended data quality is assured using the Reversible Watermarking. Robust Watermarking ensures the recovery against the attack that causes false insertion, alternation, deletion of the relational databases. As the relational database comprised of both numerical as well as non-numerical data so for watermarking both should be considered. Keywords- Robust watermarking, Reversible watermarking, non-numerical, numerical, data quality 1. INTRODUCTION In the todays digital world due to rapid growth of the Internet, the extensive growth of digital contents, and the easier distribution exclusive rights fortification of owners is becoming more and more necessary [1].Data is generated in the various formats like text, video, image, audio and relational data. Sharing data online over the internet or virtual storage space is become vital activity for organization and, which may include importing and exporting of relational data[2]. While databases are susceptible to security intimidations therefore it is essential to enforce the copyright of digital asset for tackling data interfering. Watermarking is technique which advocated Copyright over shared relational data and for providing a means of deal with data alteration. Watermarking is method of embedding data in such form that is not readily available to the unauthorized user. It allows the user to add a layer of security to the database content by recognizing exclusive rights of owner. The watermarking technique which are irreversible may causes modification of data undergoes through it at the certain extent [3].Unlike encryption or hashing technique i.e. alternative solution to security of databases content, watermarking scheme modify original database as a modulation of the watermark information, and causes impossible to prevent permanent distortion to the original database, and affects to meet the integrity requirement of many application[4]. To improve such scenario reversible watermarking is used which results in accurate and exact authentication of relational databases. This reversible watermarking technique acquires the capability of accurate rebuilding of the original information from the watermarked databases [4]. Watermarking can be threaten of malicious attack which may effect as alteration, deletion, or false insertion. The robust watermarking scheme possesses the exact recovery in the existence of active malicious attack [5]. The supplementary function is evolved that uses selective watermarking of necessary specific attribute which involves selection of suitable feature for the embedding through the watermark. The appropriate selection of the attribute for encoding provides the improvised security concern. During the feature selection it considers numerical as well non-numerical features. 2. RELATED WORK I) Histogram expansion based watermarking: This technique initiates by Yong Zhang1,2,*, Bian Yang3, [3] in which introduces that the real values over a particular variable range of [a-b,b-a] has an odd distribution. To decrease the complexity of 8
2 implementation in the histogram expansion this real value case, partial real value is used instead of the whole one which is extraction of just particular portion of each original real value. Then retrieve the digits in the original value of each error occurred where two adjacent original real values to form the final histogram. The capacity in the in this scheme is calculated between two neighbouring original partial values from the partial errors. II) Difference expansion watermarking technique: G. Gupta and J. Pieprzyk [5], proposed a watermarking scheme that is not only blind but also reversible. The application of difference expansion on the integers for achieves reversibility. The Difference expansion watermarking techniques [6], [7] accomplished way of arithmetic operations on numeric features and deliver transformations. The major advantages offered by this technique are reversibility to high quality original database, lawful owner authentication, robustness against secondary watermarking attacks, and no need of secure secondary storage for reinstating database 3. PROPOSED WORK All the Methods like Histogram expansion based watermarking, DEW, PEE, GAPEW that are discussed in the literature survey have some drawbacks. The reversible and robust watermarking system provides the quality data recovery after watermarking even in the presence of malicious attack. The watermarking scheme possesses the following main modules: 1) Watermark preprocessing 2) Watermark insertion 3) Watermark extraction 4) Data recovery. III) Difference Expansion and Support Vector Regression Prediction: Jung-Nan Chang and Hsien-Chu Wu [8] initiates the use of FP-tree data mining for the improvised choosing of valuable features in the table. Then, the related valued features of the secured field in the mining results are farther trained by SVR for forecasting the secure field. So, the calculation of each record required for the calculation of a difference between the predicted value and the original value of the secure field. Using this objective value and the LSB encoding scheme, the result is upgraded into the table. IV) Genetic algorithm and difference expansion technique(gadew): Genetic Algorithm is used to improve the capacity of DEW in databases, while distortion tolerance is fixed. GA offers some randomness in DEW technique that makes it complex to predict attributes for attacker. Security is also improved by minimizing the distortion and reducing abrupt changes occurred by DEW. This is acknowledge by two measures added in the fitness function of GA, first by using the knowledge of the neighbouring values of the database, and second by reducing the distortion introduced by selecting attributes resulting in least distortion [8]. Fig.1. System Architecture 3.1 Watermark Preprocessing In the preprocessing phase, following task are performed: (1) Selection of a function for watermarking which is selected on the basis of mutual information. The feature(s) having lower MI (mutual information) than a particular secrete threshold specified by data owner can be selected for watermarking. With consideration the attacker can try and predict the feature with the lowest MI in an order to guess which feature has been watermarked. It keeps the important feature i.e. high MI feature protected. (2) Optimal watermark is calculated with the use optimization technique i.e. Genetic Algorithm. Genetic algorithm provides i) optimum chromosomal string ii)ß value. 9
3 These parameter are further used for the watermark insertion and watermark extraction phase Genetic Algorithm 1. Determine the number of chromosomes and mutation rate and crossover rate value. 2. Generate chromosome and the initialization value of the genes chromosome. 3. Process steps 4-7 until the number of generations is met. 4. Objective function value for each chromosome. F_Obj (chromo) = Abs (chromo) Abs (chromo) = Sum (genvaltotalgenval) 5. Fitness of each chromosome. Fitness (chromo) = 1/ 1+Fobj (chromo) Total = sum (fitness of all chromo) Probability (chromo) = Fitness (chromo)/ Total. 6. Crossover 7. Mutation 8. New Chromosomes (Offspring) Calculate Objective Function F_Obj (chromo)=abs(genvalue) 9. Solution; Best Chromosomes( chromo) After n iteration final value at selected chromosome will be best chromosome. 3.2 Watermark insertion After the preprocessing in watermark insertion; information embedded in such way that accuracy of data will not degrade. Using the chromosomal string the tuple selected in preprocessing phase is encoded. The percentage change is stored in matrix which is useful in extraction phase. It is required the watermark bandwidth should be enough large to assure robustness but not so big that it extinguishes the quality of data.the watermark encoder encodes the database by working with one bit at a time. For the numerical data it is encoded by adding chromosomal string.but for the string first its ASCII value is generated then encoded as the chromosomal string in numerical (binary) form. Then after encoding it converted back in the string. 3.3 Watermark extraction In the watermark extraction the initial step is to detect the attribute which have been watermarked. In this phase watermarked information is decoded. The watermark decoder performs decoding of the watermarked database by working with one bit at a time. Decoding perform on watermarked database with the help of a matrix which consist change of percentage in data values and knowing the length of watermark bit. Watermark bit is detected from every tuple. And then final watermark string is retrieved using the Majority Voting Scheme which is responsible for providing the robustness against the malicious attack at the certain extend. After the extraction as a output we get the original chromosomal string which is used before in the encoding. 3.4 Data recovery After watermark string is detected, in this phase original data is recovered. 3.5 Algorithm Input: Original Database Begin: 1. Features are selected for watermarking base upon mutual information (MI) according to specified threshold. MI(A,B)= PAB(a,b) log P AB(a,b) /P A(a) P B(b). a b 2. Optimum watermark bit and value of ẞ is generated by Genetic algorithm. 3. Using optimum watermark bit watermark encoding is performed over the feature selected by MI. a) If watermark bit is 1, then value of ẞ subtracted. b) If watermark bit is, then value of ẞ added. 4. After the encoding the database is place over the channel. 5. Watermarked decoding i) first find the feature which is watermarked ii) then bits are decoded based upon percent change values of watermark data from each tuple iii) Then final watermark string is detected by using majority voting scheme 6. Data recovery operation is performed using the optimum value generated by the genetic algorithm. a) If watermark bit is 1, then value of ẞ subtracted. b) If watermark bit is, then value of ẞ added. End Output: Recovered database with data quality. 4. EXPERIMENTAL RESULT 4.1Experimental setup The algorithm is implemented in.net Framework 3.5 using c#. To verify the result of the proposed system output database values is compared with original input database values. 51
4 Table 2. Watermark Encoding with Bits 1, started from First Bit() value of ẞ=.31 A1 Existing System(Numerical) Proposed System(Numerical + Non-numerical) state-gov Not Applicable uvcvg/iqx private Not Applicable rtkxcvg bachelors Not Applicable cbdifopst Self-emp-inc Not Applicable Ugnh/gor/kpe Fig.2. Comparison of Recovered Data with Original data 4.2 Datasets Cleveland Heart Disease dataset: This dataset incudes information about heart disease which consist of 12 instances having disease of, instances without disease of heart and each of that instance is described by 13 attributes PAMAP2 Physical dataset: The PAMAP2 is a dataset of Monitoring Physical Activity which has data of 18 differentiate physical activities (such as walking, cycling, playing soccer, etc.), performed by 9 subjects wearing 3 inertial measurement units and a heart rate monitor. 4.3 Result Table Table 1 Selected Features Mutual Information before and after Watermarking Sr_no Name of feature MI O MI W MI 1 Age Capital_gain Capital_loss Education Education_num Hours_per_week Marital _Status Native_country Occupation Race Gender Relationship The attacks are categories as Data Insertion, Data Alternation and Data Deletion Attack Data Insertion Insert Tuple(%) Fig.3. Data Recovery after Data Insertion attack Data Alternation Alter Tuple(%) Fig.4. Data Recovery after Data Alternation attack 511
5 [3] R. Agrawal and J. Kiernan, Watermarking Data Deletion relational databases, in Proc. 28th Int. Conf. Very Large Data Bases, 22, pp [4] Y. Zhang, B. Yang, and X.-M. Niu, Reversible watermarking for relational database authentication, J. Comput., vol.17, no. 2, pp. 5966, Deleted Tuples(%) Fig.5. Data Recovery after Data Deletion attack [5] Saman Iftikhar, M. Kamran, and Zahid Anwar, RRW A Robust and Reversible Watermarking Technique for Relational Data in IEEE Trans on Knowledge and Data Engineering, VOL 27, NO. 4, April CONCLUSION AND FUTURE SCOPE The Watermarking is method of embedding data in order to provide the layer of security. Irreversible watermarking scheme performs encoding may causes the degradation of data quality. To cater such scenarios Reversible watermarking techniques are used; being reversible means the quality of original digital content is ensured. However, these techniques performance is improved by Robust Watermarking by providing the robustness against malicious attack specially that attack that affects some particular tuple. Here rather watermarking the entire database the particular feature is selected according criteria (MI value) which saves time and cost. In this paper, unlike the previous system nonnumerical (string) are also considered for watermarking as the both numerical and nonnumerical may consist the important and sensitive information. Future work will include the watermarking over distributed system i.e. shared data. 6. ACKNOWLEDGMENTS [6] G. Gupta and J. Pieprzyk, Reversible and blind database watermarking using difference expansion, in Proc. 1st Int. Conf. Forensic Appl. Tech. Telecommun., Inf., Multimedia Workshop, 28, p. 24. [7] A. M. Alattar, Reversible watermark using difference expansion of triplets, in Proc. IEEE Int. Conf. Image Process.,23, pp. I1, vol. 1. [8]G. Gupta and J. Pieprzyk, Database relation watermarking resilient against secondary watermarking attacks, in Information Systems and Security. New York, NY, USA: Springer, 29, pp [9] K. Jawad and A. Khan, Genetic algorithm and difference expansion based reversible watermarking for relational databases, J. Syst. Softw., vol. 86, no. 11, pp ,213. [1] X. Li, B. Yang, and T. Zeng, Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection, IEEE Trans. Image Process., vol. 2,no. 12, pp , Dec I am thankful to Prof P.A. Kale Assistant professor in the Department of Computer Engineering in Late G.N. Sapkal College of Engineering, Nasik. For providing constant guidance and encouragement for this research work. 7. References [1] M.E. Farfour, S.-J. Horng, J.-L.Lai, R.-S Run, R.-JChen, and M. K. Khan, A blind reversible method for watermarking relational databases based on a time-stamping protocol, Expert Syst. Appl., vol. 39, no. 3, pp , 212. [2]K. Jawad and A. Khan, Genetic algorithm and difference xpansion based reversible watermarking for relational databases, J. Syst. Softw., vol. 86, no. 11, pp ,
International Journal of Modern Trends in Engineering and Research e-issn No.: , Date: April, 2016
International Journal of Modern Trends in Engineering and Research www.ijmter.com e-issn No.:2349-9745, Date: 28-30 April, 2016 Watermarking Technology for Relational Database Priyanka R. Gadiya 1,Prashant
More informationGenetic Algorithm Based Reversible Watermarking Approach for Numeric and Non-Numeric Relational Data
Genetic Algorithm Based Reversible Watermarking Approach for Numeric and Non-Numeric Relational Data Gayatri R. Ghogare 1, Prof. Aparna Junnarkar 2 1Student, ME, Department of Computer Engineering, P.E.S
More informationIMPLEMENTATION OF OWNERSHIP RIGHTS PROTECTION FOR NUMERIC AND NON-NUMERIC RELATIONAL DATA USING WATERMARKING
International Journal of Computer Engineering and Applications, Volume X, Issue VI, June 16 www.ijcea.com ISSN 2321-3469 IMPLEMENTATION OF OWNERSHIP RIGHTS PROTECTION FOR NUMERIC AND NON-NUMERIC RELATIONAL
More informationISSN Vol.04,Issue.17, November-2016, Pages:
WWW.IJITECH.ORG ISSN 2321-8665 Vol.04,Issue.17, November-2016, Pages:3280-3287 Secure Conservatory Embedded Techniques for Reversible Watermarking of Relational Data AMTUL SUFIA 1, DR. MD. WAHEEDUDDIN
More informationGA Based Reversible Data Hiding in Encrypted Images by Reserving Room before Encryption
GA Based Reversible Hiding in Encrypted s by Reserving Room before Encryption Patil K.U. 1 &Nandwalkar B.R. 2 1,2 (Comp. Engg. Dept., GNS COENashik, SPP Univ., Pune(MS), India) Abstract Information Security
More informationReversible Data Hiding VIA Optimal Code for Image
Vol. 3, Issue. 3, May - June 2013 pp-1661-1665 ISSN: 2249-6645 Reversible Data Hiding VIA Optimal Code for Image Senthil Rani D. #, Gnana Kumari R. * # PG-Scholar, M.E-CSE, Coimbatore Institute of Engineering
More informationAN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS
AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS G Prakash 1,TVS Gowtham Prasad 2, T.Ravi Kumar Naidu 3 1MTech(DECS) student, Department of ECE, sree vidyanikethan
More informationA Formal Model to Preserve Knowledge in Outsourced Datasets
A Formal Model to Preserve Knowledge in Outsourced Datasets 1 Veera Ragavan K, 2 Karthick S 1 ME Student, 2 Asst.Prof 1,2 Dept of Software Engineering, SRM University, Chennai, India 1 ragu.skp@gmail.com,
More informationReversible Image Data Hiding with Local Adaptive Contrast Enhancement
Reversible Image Data Hiding with Local Adaptive Contrast Enhancement Ruiqi Jiang, Weiming Zhang, Jiajia Xu, Nenghai Yu and Xiaocheng Hu Abstract Recently, a novel reversible data hiding scheme is proposed
More informationA NOVEL SECURED BOOLEAN BASED SECRET IMAGE SHARING SCHEME
VOL 13, NO 13, JULY 2018 ISSN 1819-6608 2006-2018 Asian Research Publishing Network (ARPN) All rights reserved wwwarpnjournalscom A NOVEL SECURED BOOLEAN BASED SECRET IMAGE SHARING SCHEME Javvaji V K Ratnam
More informationRandom Traversing Based Reversible Data Hiding Technique Using PE and LSB
Random Traversing Based Reversible Data Hiding Technique Using PE and LSB Rhythm Katira #1, Prof. V. Thanikaiselvan *2 # ECE Department, VIT University Vellore, Tamil-Nadu, India 1 rhythm.katira2009@vit.ac.in
More informationA NEW WATERMARKING TECHNIQUE FOR SECURE DATABASE
Online Journal, www.ijcea.com A NEW WATERMARKING TECHNIQUE FOR SECURE DATABASE Jun Ziang Pinn 1 and A. Fr. Zung 2 1,2 P. S. University for Technology, Harbin 150001, P. R. China ABSTRACT Digital multimedia
More informationSecure and Reliable Watermarking in Relational Databases
Secure and Reliable Watermarking in Relational Databases G.Shyamala 1, I.Jasmine Selvakumari Jeya 2, M.Revathi 3 1 (PG Student, Dept. of CSE, Hindusthan College of Engineering and Tech, Coimbatore, Tamil
More informationHigh Capacity Reversible Watermarking Scheme for 2D Vector Maps
Scheme for 2D Vector Maps 1 Information Management Department, China National Petroleum Corporation, Beijing, 100007, China E-mail: jxw@petrochina.com.cn Mei Feng Research Institute of Petroleum Exploration
More informationMultilayer Data Embedding Using Reduced Difference Expansion
Multilayer Data Embedding Using Reduced Difference Expansion DINESH SATRE 1, DEVYANI BONDE 2, SUBHASH RATHOD 3 Department Of Computer Engineering Marathwada Mitra Mandal s Institute of Technology Savitribai
More informationA Framework to Reversible Data Hiding Using Histogram-Modification
A Framework to Reversible Data Hiding Using Histogram-Modification R. Neeraja 1 PG Student, ECE Department Gokula Krishna College of Engineering Sullurpet, India e-mail:r.p.neeru@gmail.com M. Gnana Priya
More informationInternational Journal of Innovative Research in Computer and Communication Engineering
Data Hiding Using Difference Expension Method YASMEEN M.G,RAJALAKSHMI G Final year M.E, Arunai Engineering College, Thiruvannamalai, Tamilnadu, India Assistant Professor, Arunai Engineering College,Thiruvannamalai,
More informationSecure Token Based Storage System to Preserve the Sensitive Data Using Proxy Re-Encryption Technique
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,
More informationDigital Watermarking on Micro Image using Reversible Optical Reproduction
Digital Watermarking on Micro Image using Reversible Optical Reproduction Shraddha Raut, Antra Bhattacharya & S. P. Khandait G.H.R.I.E.T.W, G.H.R.I.E.T.W, K.D.K.C.E E-mail : rautshraddha@yahoo.in, antarab@rediffmail.com,
More informationWatermarking for Security in Database
Watermarking for Security in Database Prof. Manoj Dhande Department of Computer Engineering of Shah and Anchor Kutchhi Engineering College, Chembur, University of manoj.dhande@gmail.com Aishwarya Kotyankar
More informationReversible Texture Synthesis for Data Security
Reversible Texture Synthesis for Data Security 1 Eshwari S. Mujgule, 2 N. G. Pardeshi 1 PG Student, 2 Assistant Professor 1 Computer Department, 1 Sanjivani College of Engineering, Kopargaon, Kopargaon,
More informationRelational Database Watermarking for Ownership Protection
Available online at www.sciencedirect.com Procedia Technology 6 (2012 ) 988 995 2nd International Conference on Communication, Computing & Security [ICCCS-2012] Relational Database Watermarking for Ownership
More informationWatermarking Of Relational Databases Mohit H Bhesaniya 1, Kunal Thanki 2
Watermarking Of Relational s Mohit H Bhesaniya 1, Kunal Thanki 2 1 Department of computer engineering, AITS, Rajkot,Gujarat, India. 2 Department of computer engineering, Government polytechnique, porbandar.gujarat,
More informationReversible Blind Watermarking for Medical Images Based on Wavelet Histogram Shifting
Reversible Blind Watermarking for Medical Images Based on Wavelet Histogram Shifting Hêmin Golpîra 1, Habibollah Danyali 1, 2 1- Department of Electrical Engineering, University of Kurdistan, Sanandaj,
More informationPreprocessing of Stream Data using Attribute Selection based on Survival of the Fittest
Preprocessing of Stream Data using Attribute Selection based on Survival of the Fittest Bhakti V. Gavali 1, Prof. Vivekanand Reddy 2 1 Department of Computer Science and Engineering, Visvesvaraya Technological
More informationFREQUENT ITEMSET MINING USING PFP-GROWTH VIA SMART SPLITTING
FREQUENT ITEMSET MINING USING PFP-GROWTH VIA SMART SPLITTING Neha V. Sonparote, Professor Vijay B. More. Neha V. Sonparote, Dept. of computer Engineering, MET s Institute of Engineering Nashik, Maharashtra,
More informationOptimizing Image Steganography using Genetic Algorithm
Optimizing Image Steganography using Genetic Algorithm 1 Gangeshawar, 2 James Attri 1 M.Tech(CSE),Satya College of Engg.& Tech.,Palwal, India 2 Asst. Prof (CSE), Satya College of Engg.& Tech.,Palwal, India
More informationError-free Authentication Watermarking Based on Prediction-Error-Expansion Reversible Technique
ISSC 2013, LYIT Letterkenny, June 20 21 Error-free Authentication Watermarking Based on Prediction-Error-Expansion Reversible Technique Rongrong Ni,H.D.Cheng, Yao Zhao andyuhou Institute of Information
More informationApproach Using Genetic Algorithm for Intrusion Detection System
Approach Using Genetic Algorithm for Intrusion Detection System 544 Abhijeet Karve Government College of Engineering, Aurangabad, Dr. Babasaheb Ambedkar Marathwada University, Aurangabad, Maharashtra-
More informationUse of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography
Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography K.S.Seethalakshmi (Department of Computer Science and Engineering, RVCE / VTU, INDIA) ABSTRACT : As a result of
More informationNOVEL HYBRID GENETIC ALGORITHM WITH HMM BASED IRIS RECOGNITION
NOVEL HYBRID GENETIC ALGORITHM WITH HMM BASED IRIS RECOGNITION * Prof. Dr. Ban Ahmed Mitras ** Ammar Saad Abdul-Jabbar * Dept. of Operation Research & Intelligent Techniques ** Dept. of Mathematics. College
More informationImproved Reversible Data Hiding in Encrypted Images Based on Reserving Room After Encryption and Pixel Prediction
Improved Reversible Data Hiding in Encrypted Images Based on Reserving Room After Encryption and Pixel Prediction Ioan Catalin Dragoi, Henri-George Coanda and Dinu Coltuc Electrical Engineering Dept. Valahia
More informationVarious Approaches for Watermarking of Relational Databases Mohit Bhesaniya, J.N.Rathod, Kunal Thanki
Various Approaches for Watermarking of Relational s Mohit Bhesaniya, J.N.Rathod, Kunal Thanki Abstract as a tool for storing and managing data, relational database is widely used in many information systems.
More informationA New Approach to Authenticate Images in Different Datasets Using a Lossless Image Watermarking Technique
A New Approach to Authenticate Images in Different Datasets Using a Lossless Image Watermarking Technique 1 Arathi Chitla, 2 Dr. M. Chandra Mohan 1 Associate Professor, Department of Computer Science &
More informationClassification and Optimization using RF and Genetic Algorithm
International Journal of Management, IT & Engineering Vol. 8 Issue 4, April 2018, ISSN: 2249-0558 Impact Factor: 7.119 Journal Homepage: Double-Blind Peer Reviewed Refereed Open Access International Journal
More informationImage Authentication and Recovery Scheme Based on Watermarking Technique
Image Authentication and Recovery Scheme Based on Watermarking Technique KENJI SUMITOMO 1, MARIKO NAKANO 2, HECTOR PEREZ 2 1 Faculty of Information and Computer Engineering The University of Electro-Communications
More informationResearch of Applications in Relational Database on Digital. Watermarking Technology
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 9ǁ September 2013 ǁ PP.84-89 Research of Applications in Relational Database on Digital
More informationFeature Based Watermarking Algorithm by Adopting Arnold Transform
Feature Based Watermarking Algorithm by Adopting Arnold Transform S.S. Sujatha 1 and M. Mohamed Sathik 2 1 Assistant Professor in Computer Science, S.T. Hindu College, Nagercoil, Tamilnadu, India 2 Associate
More informationGenetic algorithm for optimal imperceptibility in image communication through noisy channel
Genetic algorithm for optimal imperceptibility in image communication through noisy channel SantiP.Maity 1, Malay K. Kundu 2 andprasantak.nandi 3 1 Bengal Engineering College (DU), P.O.-Botanic Garden,
More informationLSB Based Audio Steganography Using Pattern Matching
ISSN: 359-0040 Vol 2 Issue, November - 205 LSB Based Audio Steganography Using Pattern Matching Mr Ratul Choudhury Student, Dept of Computer Sc & Engg Dept University of Calcutta Kolkata, India ratulchowdhury@iemcalcom
More informationAccumulative Privacy Preserving Data Mining Using Gaussian Noise Data Perturbation at Multi Level Trust
Accumulative Privacy Preserving Data Mining Using Gaussian Noise Data Perturbation at Multi Level Trust G.Mareeswari 1, V.Anusuya 2 ME, Department of CSE, PSR Engineering College, Sivakasi, Tamilnadu,
More informationNovel Video Inpainting and Secure QR Code Watermarking Technique
Novel Video Inpainting and Secure QR Code Watermarking Technique Miss. Priti N. Chaudhari 1, Prof. Disha Deotale 2 M.E. Student, Department of Computer Engineering, G. H. Raisoni Institute of Engineering
More informationData Hiding in Binary Text Documents 1. Q. Mei, E. K. Wong, and N. Memon
Data Hiding in Binary Text Documents 1 Q. Mei, E. K. Wong, and N. Memon Department of Computer and Information Science Polytechnic University 5 Metrotech Center, Brooklyn, NY 11201 ABSTRACT With the proliferation
More informationEMBEDDING WATERMARK IN VIDEO RECORDS
EMBEDDING WATERMARK IN VIDEO RECORDS D.Abirami UG (CSE), Sri Krishna College of Technology, Anna University abidhanabal17@gmail.com R.Gowsika UG (CSE), Sri Krishna College of Technology, Anna University
More information1. Introduction. 2. Motivation and Problem Definition. Volume 8 Issue 2, February Susmita Mohapatra
Pattern Recall Analysis of the Hopfield Neural Network with a Genetic Algorithm Susmita Mohapatra Department of Computer Science, Utkal University, India Abstract: This paper is focused on the implementation
More informationFRAME BASED RECOVERY OF CORRUPTED VIDEO FILES
FRAME BASED RECOVERY OF CORRUPTED VIDEO FILES D.Suresh 1, D.V.Ramana 2, D.Arun Kumar 3 * 1 Assistant Professor, Department of ECE, GMRIT, RAJAM, AP, INDIA 2 Assistant Professor, Department of ECE, GMRIT,
More informationConcealing Information in Images using Progressive Recovery
Concealing Information in Images using Progressive Recovery Pooja R 1, Neha S Prasad 2, Nithya S Jois 3, Sahithya KS 4, Bhagyashri R H 5 1,2,3,4 UG Student, Department Of Computer Science and Engineering,
More informationA reversible data hiding based on adaptive prediction technique and histogram shifting
A reversible data hiding based on adaptive prediction technique and histogram shifting Rui Liu, Rongrong Ni, Yao Zhao Institute of Information Science Beijing Jiaotong University E-mail: rrni@bjtu.edu.cn
More informationReconstruction Improvements on Compressive Sensing
SCITECH Volume 6, Issue 2 RESEARCH ORGANISATION November 21, 2017 Journal of Information Sciences and Computing Technologies www.scitecresearch.com/journals Reconstruction Improvements on Compressive Sensing
More informationIMPROVED RHOMBUS INTERPOLATION FOR REVERSIBLE WATERMARKING BY DIFFERENCE EXPANSION. Catalin Dragoi, Dinu Coltuc
0th European Signal Processing Conference (EUSIPCO 01) Bucharest, Romania, August 7-31, 01 IMPROVED RHOMBUS INTERPOLATION FOR REVERSIBLE WATERMARKING BY DIFFERENCE EXPANSION Catalin Dragoi, Dinu Coltuc
More informationIMPROVING THE RELIABILITY OF DETECTION OF LSB REPLACEMENT STEGANOGRAPHY
IMPROVING THE RELIABILITY OF DETECTION OF LSB REPLACEMENT STEGANOGRAPHY Shreelekshmi R, Wilscy M 2 and C E Veni Madhavan 3 Department of Computer Science & Engineering, College of Engineering, Trivandrum,
More informationA REVIEW ON IMAGE RETRIEVAL USING HYPERGRAPH
A REVIEW ON IMAGE RETRIEVAL USING HYPERGRAPH Sandhya V. Kawale Prof. Dr. S. M. Kamalapur M.E. Student Associate Professor Deparment of Computer Engineering, Deparment of Computer Engineering, K. K. Wagh
More informationLiterature Survey on Performance of Reversible Data Hiding Algorithm
Literature Survey on Performance of Reversible Data Hiding Algorithm Sona Ignacious PG Scholar Department of ECE, PET Engineering College, India Abstract-DATA hiding technique aims to embed some secret
More informationREVERSIBLE DATA HIDING SCHEME BASED ON PREDICTION ERROR SORTING AND DOUBLE PREDICTION.
REVERSIBLE DATA HIDING SCHEME BASED ON PREDICTION ERROR SORTING AND DOUBLE PREDICTION Ling-ling WAN 1,Fan CHEN 1, Hong-jie HE 1,Lei ZHANG 2 1 the School of Information Science and Technology, Southwest
More informationINTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 6367(Print) ISSN 0976 6375(Online)
More informationOptimized Watermarking Using Swarm-Based Bacterial Foraging
Journal of Information Hiding and Multimedia Signal Processing c 2009 ISSN 2073-4212 Ubiquitous International Volume 1, Number 1, January 2010 Optimized Watermarking Using Swarm-Based Bacterial Foraging
More informationII. RELATIVE WORK The earlier watermarking techniques were proposed for data hiding applications only [2, 7]. Then, the authentication capability beca
ROI based Tamper Detection and Recovery for Medical Images Using Reversible Watermarking Technique Osamah M. Al-Qershi, Bee Ee Khoo School of Electrical and Electronic Engineering Universiti Sains Malaysia
More informationAdvanced Digital Image Forgery Detection by Using SIFT
RESEARCH ARTICLE OPEN ACCESS Advanced Digital Image Forgery Detection by Using SIFT Priyanka G. Gomase, Nisha R. Wankhade Department of Information Technology, Yeshwantrao Chavan College of Engineering
More informationCOMPARISON OF WATERMARKING TECHNIQUES DWT, DWT-DCT & DWT-DCT-PSO ON THE BASIS OF PSNR & MSE
COMPARISON OF WATERMARKING TECHNIQUES DWT, DWT-DCT & DWT-DCT-PSO ON THE BASIS OF PSNR & MSE Rashmi Dewangan 1, Yojana Yadav 2 1,2 Electronics and Telecommunication Department, Chhatrapati Shivaji Institute
More informationPRIVACY PRESERVING CONTENT BASED SEARCH OVER OUTSOURCED IMAGE DATA
PRIVACY PRESERVING CONTENT BASED SEARCH OVER OUTSOURCED IMAGE DATA Supriya Pentewad 1, Siddhivinayak Kulkarni 2 1 Department of Computer Engineering. MIT College of Engineering, Pune, India 2 Department
More informationCHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM
74 CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM Many data embedding methods use procedures that in which the original image is distorted by quite a small
More informationA Flexible Scheme of Self Recovery for Digital Image Protection
www.ijcsi.org 460 A Flexible Scheme of Self Recoery for Digital Image Protection Zhenxing Qian, Lili Zhao 2 School of Communication and Information Engineering, Shanghai Uniersity, Shanghai 200072, China
More informationEMPIRICAL ANALYSIS ON STEGANOGRAPHY USING JSTEG, OUTGUESS 0.1 AND F5 ALGORITHMS
EMPIRICAL ANALYSIS ON STEGANOGRAPHY USING JSTEG, OUTGUESS 0.1 AND F5 ALGORITHMS Dr. N.MANOHARAN 1 Dr.R.BALASUBRAMANIAN 2 S.UMA NANDHINI 3 V.SUJATHA 4 1 Assistant Professor in Department of Computer Science,
More informationImproving the QOS in Video Streaming Multicast
Improving the QOS in Video Streaming Multicast Sujatha M. Assistant Professor, St. Joseph Engineering College, Vamanjoor,Mangalore, Karnataka, India-575028. Email: sujatha_msk@yahoo.co.in Abstract In a
More informationISSN Vol.04,Issue.05, May-2016, Pages:
WWW.IJITECH.ORG ISSN 2321-8665 Vol.04,Issue.05, May-2016, Pages:0737-0741 Secure Cloud Storage using Decentralized Access Control with Anonymous Authentication C. S. KIRAN 1, C. SRINIVASA MURTHY 2 1 PG
More informationText Hiding In Multimedia By Huffman Encoding Algorithm Using Steganography
Text Hiding In Multimedia By Huffman Encoding Algorithm Using Steganography Madhavi V.Kale 1, Prof. Swati A.Patil 2 PG Student, Dept. Of CSE., G.H.Raisoni Institute Of Engineering And Management,Jalgaon
More informationOptimization of Association Rule Mining through Genetic Algorithm
Optimization of Association Rule Mining through Genetic Algorithm RUPALI HALDULAKAR School of Information Technology, Rajiv Gandhi Proudyogiki Vishwavidyalaya Bhopal, Madhya Pradesh India Prof. JITENDRA
More informationInformation Cloaking Technique with Tree Based Similarity
Information Cloaking Technique with Tree Based Similarity C.Bharathipriya [1], K.Lakshminarayanan [2] 1 Final Year, Computer Science and Engineering, Mailam Engineering College, 2 Assistant Professor,
More informationA Brief Comparison of Security Patterns for Peer to Peer Systems
A Brief Comparison of Security Patterns for Peer to Peer Systems Rahul J. Vaghela 1, Kalpesh Patel 2 1 PG Student, Department of Computer Engineering, L.D. College Of Engineering, Gujarat Technological
More informationOPTIMIZED SENSOR NODES OF WIRELESS SENSOR NETWORK BY FAULT NODE RECOVERY ALGORITHM
OPTIMIZED SENSOR NODES OF WIRELESS SENSOR NETWORK BY FAULT NODE RECOVERY ALGORITHM Chauhan Ajitkumar 1, Asst. Prof. Jignesh V. Patel 2 1PG Scholar, EC Dept., SPCE, Visnagar, Gujarat, India. 2Assistant
More informationVideo shot segmentation using late fusion technique
Video shot segmentation using late fusion technique by C. Krishna Mohan, N. Dhananjaya, B.Yegnanarayana in Proc. Seventh International Conference on Machine Learning and Applications, 2008, San Diego,
More informationSurvey Paper on Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
More informationFUZZY FOREST LEARNING BASED ONLINE FACIAL BIOMETRIC VERIFICATION FOR PRIVACY PROTECTION
FUZZY FOREST LEARNING BASED ONLINE FACIAL BIOMETRIC VERIFICATION FOR PRIVACY PROTECTION Supritha G M 1, Shivanand R D 2 1 P.G. Student, Dept. of Computer Science and Engineering, B.I.E.T College, Karnataka,
More informationSegmentation of Noisy Binary Images Containing Circular and Elliptical Objects using Genetic Algorithms
Segmentation of Noisy Binary Images Containing Circular and Elliptical Objects using Genetic Algorithms B. D. Phulpagar Computer Engg. Dept. P. E. S. M. C. O. E., Pune, India. R. S. Bichkar Prof. ( Dept.
More informationI. INTRODUCTION. Figure-1 Basic block of text analysis
ISSN: 2349-7637 (Online) (RHIMRJ) Research Paper Available online at: www.rhimrj.com Detection and Localization of Texts from Natural Scene Images: A Hybrid Approach Priyanka Muchhadiya Post Graduate Fellow,
More informationResults and Discussions on Transaction Splitting Technique for Mining Differential Private Frequent Itemsets
Results and Discussions on Transaction Splitting Technique for Mining Differential Private Frequent Itemsets Sheetal K. Labade Computer Engineering Dept., JSCOE, Hadapsar Pune, India Srinivasa Narasimha
More informationImproving Latent Fingerprint Matching Performance by Orientation Field Estimation using Localized Dictionaries
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 11, November 2014,
More informationPRIVACY PRESERVING RANKED MULTI KEYWORD SEARCH FOR MULTIPLE DATA OWNERS. SRM University, Kattankulathur, Chennai, IN.
Volume 115 No. 6 2017, 585-589 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu PRIVACY PRESERVING RANKED MULTI KEYWORD SEARCH FOR MULTIPLE DATA OWNERS
More informationInternational Journal of Modern Trends in Engineering and Research
International Journal of Modern Trends in Engineering and Research www.ijmter.com e-issn No.:2349-9745, Date: 2-4 July, 2015 Analysis of Content Based Video Copy Detection using different Wavelet Transforms
More informationDigital Image Steganography Techniques: Case Study. Karnataka, India.
ISSN: 2320 8791 (Impact Factor: 1.479) Digital Image Steganography Techniques: Case Study Santosh Kumar.S 1, Archana.M 2 1 Department of Electronicsand Communication Engineering, Sri Venkateshwara College
More informationA Comprehensive Survey of Watermarking Relational Databases Research
1 A Comprehensive Survey of Watermarking Relational Databases Research M. Kamran and Muddassar Farooq Abstract Watermarking and fingerprinting of relational databases are quite proficient for ownership
More informationUsing Genetic Algorithm with Triple Crossover to Solve Travelling Salesman Problem
Proc. 1 st International Conference on Machine Learning and Data Engineering (icmlde2017) 20-22 Nov 2017, Sydney, Australia ISBN: 978-0-6480147-3-7 Using Genetic Algorithm with Triple Crossover to Solve
More informationAn Overview of various methodologies used in Data set Preparation for Data mining Analysis
An Overview of various methodologies used in Data set Preparation for Data mining Analysis Arun P Kuttappan 1, P Saranya 2 1 M. E Student, Dept. of Computer Science and Engineering, Gnanamani College of
More informationCOMPARATIVE ANALYSIS OF EYE DETECTION AND TRACKING ALGORITHMS FOR SURVEILLANCE
Volume 7 No. 22 207, 7-75 ISSN: 3-8080 (printed version); ISSN: 34-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu COMPARATIVE ANALYSIS OF EYE DETECTION AND TRACKING ALGORITHMS FOR SURVEILLANCE
More informationComparison of Wavelet Based Watermarking Techniques for Various Attacks
International Journal of Engineering and Technical Research (IJETR) ISSN: 2321-0869, Volume-3, Issue-4, April 2015 Comparison of Wavelet Based Watermarking Techniques for Various Attacks Sachin B. Patel,
More informationReversible Watermarking Technique using Histogram Shifting Modulations
Reversible Watermarking Technique using Histogram Shifting Modulations Archana Jadhav, M. Omkar Sharma Abstract This paper proposes creating new reversible marking technique. This originally based on indentifying
More informationA Secure System for Evaluation and Management of Authentication, Trust and Reputation in Cloud-Integrated Sensor Networks
International Journal of Engineering and Technical Research (IJETR) A Secure System for Evaluation and Management of Authentication, Trust and Reputation in Cloud-Integrated Sensor Networks Ms. Arati Phadtare,
More informationVisual Cryptography Scheme with Authentication Using Shamir Andmk Reddy Techniques
International Refereed Journal of Engineering and Science (IRJES) ISSN (Online) 2319-183X, (Print) 2319-1821 Volume 5, Issue 5 (May 2016), PP.07-14 Visual Cryptography Scheme with Authentication Using
More informationTowards a Telltale Watermarking Technique for Tamper-Proofing
Towards a Telltale Watermarking Technique for Tamper-Proofing Deepa Kundur and Dimitrios Hatzinakos 10 King s College Road Department of Electrical and Computer Engineering University of Toronto Toronto,
More informationA New Algorithm for QR Code Watermarking Technique For Digital Images Using Wavelet Transformation Alikani Vijaya Durga, S Srividya
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Issue - 8 August, 2014 Page No. 7776-7782 A New Algorithm for QR Code Watermarking Technique For Digital
More informationEnhanced Hexagon with Early Termination Algorithm for Motion estimation
Volume No - 5, Issue No - 1, January, 2017 Enhanced Hexagon with Early Termination Algorithm for Motion estimation Neethu Susan Idiculay Assistant Professor, Department of Applied Electronics & Instrumentation,
More informationCorrelation Based Feature Selection with Irrelevant Feature Removal
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
More informationQR Code Watermarking Algorithm Based on DWT and Counterlet Transform for Authentication
Advances in Computational Sciences and Technology ISSN 0973-6107 Volume 10, Number 5 (2017) pp. 1233-1244 Research India Publications http://www.ripublication.com QR Code Watermarking Algorithm Based on
More informationA QR code identification technology in package auto-sorting system
Modern Physics Letters B Vol. 31, Nos. 19 21 (2017) 1740035 (5 pages) c World Scientific Publishing Company DOI: 10.1142/S0217984917400358 A QR code identification technology in package auto-sorting system
More informationAvailable online at ScienceDirect. The 4th International Conference on Electrical Engineering and Informatics (ICEEI 2013)
Available online at www.sciencedirect.com ScienceDirect Procedia Technology 11 ( 2013 ) 614 620 The 4th International Conference on Electrical Engineering and Informatics (ICEEI 2013) Reversible Fragile
More informationOptimization of Query Processing in XML Document Using Association and Path Based Indexing
Optimization of Query Processing in XML Document Using Association and Path Based Indexing D.Karthiga 1, S.Gunasekaran 2 Student,Dept. of CSE, V.S.B Engineering College, TamilNadu, India 1 Assistant Professor,Dept.
More informationMultimedia Security: So What s the Big Deal?
Multimedia Security: So What s the Big Deal? Edward J. Delp Purdue University School of Electrical and Computer Engineering Video and Image Processing Laboratory (VIPER) West Lafayette, Indiana email:
More informationRecord Linkage using Probabilistic Methods and Data Mining Techniques
Doi:10.5901/mjss.2017.v8n3p203 Abstract Record Linkage using Probabilistic Methods and Data Mining Techniques Ogerta Elezaj Faculty of Economy, University of Tirana Gloria Tuxhari Faculty of Economy, University
More informationINFREQUENT WEIGHTED ITEM SET MINING USING NODE SET BASED ALGORITHM
INFREQUENT WEIGHTED ITEM SET MINING USING NODE SET BASED ALGORITHM G.Amlu #1 S.Chandralekha #2 and PraveenKumar *1 # B.Tech, Information Technology, Anand Institute of Higher Technology, Chennai, India
More informationAbstract. Keywords: Genetic Algorithm, Mean Square Error, Peak Signal to noise Ratio, Image fidelity. 1. Introduction
A Report on Genetic Algorithm based Steganography for Image Authentication by Amrita Khamrui Enrolled Scholar Department of Computer Science & Engineering, Kalyani University Prof. (Dr.) J K Mandal Professor
More information